Preview

Secured Mail Through Pgp Mail Gateway

Powerful Essays
Open Document
Open Document
3611 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secured Mail Through Pgp Mail Gateway
Secured Mail through PGP Mail Gateway
L.S Haturusinha, Y.Y Landersz, A.U.H Gamage, P.N Pathiranage, G.T.D Rodrigo, M.P.A.W. Gamage

Sri Lanka Institute of Information Technology

pgpgateway@gmail.com, anjalie.g@sliit.lk

Abstract - PGP Mail Gateway is a backend server which acts like a gateway for mail encryption and decryption with digital signature using industry standards available on open source environment. It is designed to be deployed even on an existing mail server or as a separate backend service where it will provide email security through GPG (open source version of PGP) encryption. Therefore this system will not route emails but will handle only email encryption and decryption. PGP Mail Gateway will serve the purpose of providing email security to a business entity which requires a low cost but highly secure solution with user interactivity kept at a minimum.

Keywords- PGPMG - PGP Mail Gateway, RFC – Request for Comments, Cryptography - is the practice and study of techniques for secure communication, Cypher text – text with cryptography applied on them , Encryption – turning plain text in to cypher text, Decryption, SMTP – Simple Mail Transfer Protocol. I. INTRODUCTION

Email is apparently the most popular mode of communication in the world. An email is considered an open postcard which traverses through internet where anyone can read it. Thus, it goes through an unprotected network before it reaches the destination. Several RFCs on enhancing the privacy of emails have been put forward by different groups in order to bring more secure platform to the user [1].

However, several cryptographic methods are available such as symmetric-key encryption, Caesar’s cipher and public key cryptography [2]. By using these methods several data encryption methods have been implemented.

A. Pretty Good Privacy (PGP) This data encryption and decryption program is often used for signing, encrypting, decrypting texts, files, etc… PGP



References: 1] M.Brinkers, “Why You Should Encrypt Your Email”, djigzo.com, para.3, Jan. 14, 2011. [online]. Available: http://www.djigzo.com/. [Accessed Feb. 22, 2011]. 2] Network Associates, “How PGP Works”, pgpi.org, 1990-1999, [online]. Available: http://www.pgpi.org/doc/pgpintro/. [Accessed Feb. 19, 2011]. 3] Admin, “PGP Universal Gateway Email”, Symantec.com, para.1, 1995-2011, [online]. Available: http://www.symantec.com/business/universal-gateway-email. [Accessed Feb. 25, 2011]. 4] Admin, “Z1 SecureMail Gateway”, freshmeat.net, para.1, Feb. 03, 2011. [online]. Available: http://freshmeat.net/projects/z1securemailgateway/. [Accessed Feb. 22, 2011].

You May Also Find These Documents Helpful

  • Satisfactory Essays

    External Mail Services

    • 536 Words
    • 3 Pages

    Internal mail services are used to communicate within the council which is free of charge and a lot quicker.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    8. Which protocol is used for a variety of functions in the e-mail server, such as resolving the numeric address of email.user@emailserver.net, and which servers are blacklisted for being sources of Unsolicited…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. Decrypt the following. You may use one of the readily available tools on the internet to perform this encryption. Please provide the link (URL) of the tool you used.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Data Encryption Standard (DES), ROT13, and Enigma are all examples of algorithm for the encryption of electronic data…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab Answers

    • 617 Words
    • 3 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 617 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In a business environment it’s essential that you have correct mail handling procedures in order to keep information safe and secure this can be client’s details, account details, personal information of employees etc. This needs to be protected in order to avoid illegal misuse of data and personal information leading to fraudulent activities.…

    • 2151 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The GNU Privacy Guard (GnuPG) is GNU 's tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, and help authenticating using Secure Shell and to provide a framework for public key cryptography. It includes an advanced key management facility and is compliant with the OpenPGP and S/MIME standards. Gpg4win is GNU Privacy Guard for Windows and Kleopatra is the certificate manager in Gpg4win. To create OpenPGP and X.509 certificates, Gpg4win uses a key length of 2048bit by default. The default algorithm for signing and encrypting is RSA. [1]…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    ISSC362 Lab 2 Assessment

    • 492 Words
    • 2 Pages

    If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?…

    • 492 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy is a much required freedom needed to be adopted and practiced in our modern society. From the tycoons in Wall Street to our own Electronic Mail, disclosure of personal information should be stopped and eluded for one's own benefit. While surfing through one self's mail, it is very common that he or she might encounter numerous Spam mails about "Easy Diets" or the famed "Free Ipad" which has perhaps become a cliché by now. One might even occasionally sight the name or the address of the user himself. This rouses a sense of insecurity and anxiety about the other specifics the "sender" has held which can be used against one. The details might vary from Monetary hacking through Credit Card Numbers to Piracy. Such problems need the immediate attention of the cyber police to maintain a more sound and assured environment for the users of the Internet.…

    • 435 Words
    • 2 Pages
    Good Essays

Related Topics